High-tech

High-tech
Light

Monday, June 2, 2014

The Internet of Things gets real

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jun 2, 2014 2:01 PM
Subject: The Internet of Things gets real
To: <aquarianm@gmail.com>
Cc:

77% of lawyers can't be trusted … with your confidential data

Bell Canada field-service techs say 'Goodbye laptops, hello smartphones'

Network World Daily News PM
June 02, 2014
Share this email

The Internet of Things gets real

A year ago, people were mostly talking about the potential of the Internet of Things (IoT) — what companies and government entities might do in the future to take advantage of this widespread network of connected objects.

READ MORE
 

Issue highlights

1. 77% of lawyers can't be trusted … with your confidential data

2. Bell Canada field-service techs say 'Goodbye laptops, hello smartphones'

3. Internet guru Mary Meeker says enterprise technology is getting cheaper

4. Google plans investment in satellite fleet to connect remote parts of the world

5. Future of secure messenger in doubt after Pirate Bay arrest

6. Windows 7 powers more than half of all PCs

7. Demand for extra-large iPhone may be overstated

8. ABM overcomes pro-VMware bias to adopt Microsoft's Hyper-V

9. 1 year of NSA leaks later, it's time to take back your privacy: Reset the Net

10. Beware the next circle of hell: Unpatchable systems

WEBCAST: Xirrus

Isn't it time to take a fresh look to Wi-Fi scalability?

Date: Thursday, June 26, 2014, 2:00 PM EDT It isn't news that wireless networks are being pushed to the limits every day and IT organizations are under duress to deliver a reliable wireless network to meet the demands of users. Learn more!

77% of lawyers can't be trusted … with your confidential data

When using email to communicate, more than three-quarters of all lawyers treat their clients' confidential information with all the care you'd expect from a teenager posting to Facebook, according to a new survey. Only 22 percent claim to use encryption. And a full 77% cop to relying solely on "confidentiality statements," otherwise known as virtually nothing. READ MORE

Bell Canada field-service techs say 'Goodbye laptops, hello smartphones'

Thousands of Bell Canada field technicians this fall will begin doing their jobs of installing and testing telecom and media services connections with help from custom-designed smartphone apps rather than via their laptops. It's all part of what Bell Canada is calling its "One Device" mobile initiative, in essence, a mobility makeover. READ MORE

Internet guru Mary Meeker says enterprise technology is getting cheaper

Every year, the Internet community waits breathlessly for Mary Meeker's Internet Trends presentation, where the celebrated Kleiner Perkins Caufield & Byers tech analyst lays out what's happening in a series of insightful charts and graphs. READ MORE

WHITE PAPER: Dell Boomi

OVUM Case Study: Adoption of Dell Boomi AtomSphere iPaaS

Thinking of using traditional middleware solutions for cloud and mobile integration scenarios? Read this case study to learn how Novartis leveraged Dell Boomi to achieve greater agility, reduce development efforts and experience a lower TCO. Read now!

Google plans investment in satellite fleet to connect remote parts of the world

After experimenting with high altitude balloons, Google is now also looking use a fleet of low-earth-orbit satellites to bring Internet access to remote regions of the world. READ MORE

Future of secure messenger in doubt after Pirate Bay arrest

The arrest of Peter Sunde for his involvement with The Pirate Bay has put the future of his latest project, a spy-proof text messaging app, in doubt. READ MORE

Windows 7 powers more than half of all PCs

As Windows XP continued its decline, users who deserted the obsolete operating system shifted to Windows 7, not the newer Windows 8, more circumstantial evidence that commercial customers, not consumers, now drive PC sales. READ MORE

WHITE PAPER: APC by Schneider Electric

Containerized Power and Cooling Modules for Data Centers

This white paper compares the cost benefits of both Standardized and Containerized data center cooling infrastructures, presents the advantages and disadvantages of each, and identifies which environments can best leverage the facility module approach. Learn More

Demand for extra-large iPhone may be overstated

Although Apple watchers expect the company to boost the iPhone's screen size this fall, demand for a very large display is actually weak among iPhone owners in China -- and even weaker in the U.S. READ MORE

ABM overcomes pro-VMware bias to adopt Microsoft's Hyper-V

Saving about $2 million was the primary reason international business-facility management firm ABM decided to convert its virtual infrastructure from VMware's vSphere to Microsoft's Hyper-V, but that came only after a period of having Microsoft prove that its virtual environment was ready. READ MORE

1 year of NSA leaks later, it's time to take back your privacy: Reset the Net

June 5 marks the one-year anniversary of the first documents leaked by Edward Snowden. READ MORE

Beware the next circle of hell: Unpatchable systems

Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling READ MORE

WEBCAST: Fortinet

What should I look for in a Next Generation Firewall?

With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different. John Pescatore of SANS Institute originally coined the phrase and now explains what he suggests enterprises look for when considering alternative NGFW solutions. Learn more >>

SLIDESHOWS

15 more weird things in the Internet of Things

The Internet of Things is growing, and the things are getting weirder by the day.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. TrueCrypt's abrupt demise 'puzzling, bizarre'

2. Cisco purchase of CIA-funded company may fuel distrust abroad

3. How MIT and Caltech's coding breakthrough could accelerate mobile network speeds

4. What's really behind the Microsoft-Salesforce deal

5. America's 6 top-paid CTOs

6. ITworld cartoons 2014: The year in geek humor

7. iPhone 6 rumor rollup for the week ending May 30

8. The PSTN Transition to VoIP: Security Must be Addressed

9. Beware the next circle of hell: Unpatchable systems

10. How consumers are holding back retail tech advances

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment